◆ XILIGENTFIELD NOTES·DPDPA PITFALLS
Field Notes · Issue 06 · APR 26, 2026

5 DPDPA Mistakes Indian SMBs Are Already Making

The five operational gaps surfacing repeatedly in Indian SMB compliance reviews in 2026 — and what to do about each before enforcement lands in May 2027.

From the essay
The failures are operational, not legal. Indian SMBs are not struggling to understand DPDPA — they are struggling to translate it into the workflows, documents, and inboxes that turn the law into day-to-day practice.
◆ FIG. 01 — XILIGENT FIELD NOTES VOL. 06

Eighteen months out from full DPDPA enforcement, a clear pattern is emerging in how Indian SMBs are approaching the law. Some of it is encouraging — there is far more awareness in 2026 than there was even a year ago. But across hundreds of conversations with founders, ops leads, and compliance owners, the same five mistakes keep showing up.

None of them are unfixable. All of them are cheaper to address now, in the build window, than after the May 2027 enforcement date or — more likely — after a customer's vendor security review surfaces them publicly.

Here are the five most common DPDPA mistakes Indian SMBs are making in 2026, and what to do instead.


Mistake 1: "We'll Wait Until Enforcement Begins"

The most common mistake by a wide margin. The reasoning goes: enforcement begins in May 2027, the DPBI is still ramping up, no one has been fined yet, and there are more pressing things on the roadmap. Compliance work can wait.

The flaw in this reasoning is that enforcement is not when DPDPA starts mattering for SMBs. The procurement consequences arrive much earlier.

Throughout 2026, large enterprise buyers — banks, insurers, fintech, healthcare, large SaaS companies, multinationals operating in India — are baking DPDPA-readiness into vendor questionnaires and contracts. Most of them are not waiting for the enforcement deadline before they start asking. The companies failing those reviews in 2026 are not being fined — they are losing deals.

There is also a second-order problem. The compliance work itself takes time. Building a data inventory, training the team, putting in place vendor agreements, publishing a defensible privacy notice, setting up a grievance mechanism — none of these are weekend projects. Organisations that wait until Q1 2027 to begin will discover that they cannot complete the work before the enforcement date, especially if they need legal review or external help.

What to do instead: Treat 2026 as the build year. Get your minimum viable compliance stack in place by mid-2026 so you can answer customer questions credibly throughout the second half of the year. Use the runway to enforcement to refine and operationalise, not to start.


Mistake 2: Treating DPDPA as a Privacy Notice Update

This is the most cosmetically dangerous mistake. An SMB updates its website privacy policy, swaps a few GDPR references for DPDPA references, and ticks the compliance box. The new notice goes live, the founder declares the project done, and the team moves on.

The problem is that DPDPA compliance is far more about operations than about publishing. The privacy notice is one of perhaps a dozen artefacts the law expects you to have. Without the rest — the data inventory, the consent capture mechanism, the grievance process, the vendor agreements, the breach playbook, the rights workflow — the privacy notice promises things the company cannot actually deliver.

The risk this creates is specific. A data principal who reads your notice and exercises a right — say, requests access to their data — should receive a structured response within a defined timeline. If your team has no internal workflow for handling such requests, you have a documented promise (in your notice) and no operational capacity (behind the scenes). That gap is exactly what the DPBI's grievance escalation pathway is designed to surface.

What to do instead: Treat the privacy notice as the output of your compliance work, not the substitute for it. Build the underlying data inventory, processes, and vendor agreements first; then write the notice that accurately describes what the company actually does.


Mistake 3: Copying GDPR Notices Wholesale

A surprising number of Indian SMBs — especially those serving global customers — have responded to DPDPA by simply pointing at their existing GDPR-compliant privacy policy and assuming it covers them.

It does not, for several specific reasons:

  • Terminology is wrong. GDPR talks about Controllers, Processors, and Data Subjects. DPDPA uses Fiduciary, Processor, and Principal. Indian regulators will read the notice; using the wrong terminology signals that the company has not engaged with the law.
  • Legal bases are mismatched. GDPR allows six legal bases including legitimate interests. DPDPA allows only consent or a narrow set of statutorily defined legitimate uses. A notice that relies on legitimate interests as a legal basis is making a claim DPDPA does not support.
  • Rights are different. GDPR includes data portability, the right to object, and rights around automated decision-making. DPDPA does not — but it does include the right to nominate, which has no GDPR analog. A copy-pasted GDPR notice misrepresents the rights an Indian data principal actually has.
  • Grievance mechanism is required. DPDPA mandates a published grievance officer and grievance process. Most GDPR notices do not include this in the form DPDPA requires.
  • Children's age threshold differs. GDPR sets the digital age of consent at 16 (lowerable to 13). DPDPA sets it at 18, with verifiable parental consent below. A GDPR-derived notice gets this wrong.

What to do instead: Treat DPDPA as its own regime, not a translation of GDPR. The two laws share goals but get there through different architectures. Use a DPDPA-specific privacy notice that accurately reflects Indian law — even if you continue to maintain a separate GDPR notice for European users.


Mistake 4: Ignoring Vendor and Processor Obligations

Most Indian SMBs do not process personal data alone. They process it through a stack of vendors — CRM, marketing tool, payroll provider, analytics platform, hosting, customer support tool, recruitment platform, and so on. Each of these is a Data Processor under the DPDPA, and the fiduciary (you) is responsible for what they do with the data on your behalf.

The DPDPA explicitly requires that data processors handle personal data only on the documented instructions of the fiduciary, with appropriate security safeguards in place. This is operationalised through contracts — typically a Data Processing Addendum or DPA — that flow down DPDPA-compliant terms.

In practice, most Indian SMBs are missing these contracts entirely or are relying on their vendors' standard terms of service, which often were drafted before DPDPA and do not contain DPDPA-specific provisions.

The exposure this creates is twofold. First, in the event of a breach by a vendor, the fiduciary remains responsible to data principals and to the DPBI. Second, in vendor security reviews by enterprise customers, the absence of signed processor agreements is now a routine red flag. We have seen mid-market deals stall on this single issue.

What to do instead: Build a vendor inventory (which falls naturally out of your data inventory), identify which vendors process personal data on your behalf, and either sign the vendor's existing DPA or add a DPDPA-compliant processing schedule to your existing contracts. Make DPDPA flow-down clauses standard in your contracting templates going forward.


Mistake 5: No Real Grievance Redressal Mechanism

The DPDPA requires every data fiduciary to provide an effective grievance redressal mechanism for data principals. The DPBI has the explicit authority to investigate complaints from data principals, and the grievance pathway is designed to be the first stop — meaning that an SMB without a functioning grievance mechanism is effectively forcing every complaint to escalate directly to the regulator.

The most common failure mode is not the absence of a grievance email; it is the absence of a process behind it. SMBs publish a privacy@company.com address in the privacy notice, but:

  • No one is monitoring the inbox systematically
  • There is no defined response timeline
  • There is no internal workflow for resolving the complaint
  • There is no log of what came in, when, and how it was handled
  • The team has not been briefed on how to handle a complaint when it arrives

Then a complaint arrives and is mishandled — ignored, lost, sent to the wrong person, or responded to in a way that escalates rather than resolves the issue. From there, the path to the DPBI is short.

This is also one of the more common failure modes that surfaces in audit. An auditor or a customer's compliance team can simply send a test grievance and see how the company responds. If there is no response, or a chaotic one, the gap is visible immediately.

What to do instead: Set up the grievance mechanism as a real internal process, not just an email address. Designate an owner. Define response times. Maintain a log. Brief the team on how to recognise and route grievances. Run a tabletop exercise — pretend a complaint has arrived and walk through how it would be handled. Most SMBs will discover the gaps in their process within fifteen minutes of trying.


What These Mistakes Have in Common

Reading the list, a pattern emerges: the failures are operational, not legal. Indian SMBs are not, generally, struggling to understand the law in 2026. The text of the DPDPA is reasonably accessible and the rules clarified most of the operational ambiguity in November 2025. What SMBs are struggling with is building the internal infrastructure — the workflows, the documents, the contracts, the inboxes, the people — that translates the law into day-to-day practice.

This is good news, in a way. Operational problems have operational solutions. None of the five mistakes above require expensive consultants, sophisticated tooling, or deep legal expertise to fix. They require deliberate, prioritised attention from leadership and a willingness to treat compliance as something the organisation does rather than something it publishes.

The SMBs that get this right in 2026 will end up with a quiet competitive advantage — one that does not show up in pitch decks but does show up in faster sales cycles, lower customer security review friction, and the absence of expensive incidents. The SMBs that do not will spend 2027 in a noticeably worse position.


A Closing Note

The most useful exercise for an Indian SMB in 2026 is not to read another article about DPDPA. It is to set aside two hours, sit with the founders or ops leadership, and honestly answer the following questions:

  • Do we have a current data inventory?
  • Does our privacy notice match what we actually do?
  • How does a data principal exercise their rights with us today?
  • Which of our vendors process personal data on our behalf, and what contracts govern that?
  • If a grievance arrived in our inbox tomorrow, what would happen to it?

If the answers are uncomfortable, the gap analysis is essentially done — and the work to close those gaps is exactly the work that DPDPA expects. There is still time to do it well. There will not be much time to do it well a year from now.


The five mistakes above are not theoretical. They are the patterns we see in real SMB compliance reviews in 2026. The fix in every case is the same: stop treating DPDPA as a publishing exercise and start treating it as a small operational programme. Done well, the entire programme fits in a single quarter.

Field Notes · Weekly

Long-form privacy & GRC essays in your inbox. One per Tuesday. No filler.

Free. Unsubscribe in one click. We don't have a cookie banner.

© Xiligent 2026 · All rights reservedField Notes · Issue 06 · APR 2026